www-commits
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

www/proprietary malware-apple.es.html po/malwar...


From: GNUN
Subject: www/proprietary malware-apple.es.html po/malwar...
Date: Thu, 4 Aug 2016 14:30:06 +0000 (UTC)

CVSROOT:        /web/www
Module name:    www
Changes by:     GNUN <gnun>     16/08/04 14:30:06

Modified files:
        proprietary    : malware-apple.es.html 
        proprietary/po : malware-apple.es-en.html 

Log message:
        Automatic update by GNUnited Nations.

CVSWeb URLs:
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/malware-apple.es.html?cvsroot=www&r1=1.29&r2=1.30
http://web.cvs.savannah.gnu.org/viewcvs/www/proprietary/po/malware-apple.es-en.html?cvsroot=www&r1=1.23&r2=1.24

Patches:
Index: malware-apple.es.html
===================================================================
RCS file: /web/www/www/proprietary/malware-apple.es.html,v
retrieving revision 1.29
retrieving revision 1.30
diff -u -b -r1.29 -r1.30
--- malware-apple.es.html       17 Jul 2016 09:58:34 -0000      1.29
+++ malware-apple.es.html       4 Aug 2016 14:30:06 -0000       1.30
@@ -138,6 +138,14 @@
 
 <ul>
   <li>
+    <p>Una vulnerabilidad en la interfaz de programación (API) <cite>Image
+I/O</cite> de Apple permitía a un atacante <a
+href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>ejecutar
+código malicioso desde cualquier aplicación que utilizara esta API para
+renderizar cierto tipo de archivos de imagen</a>.</p>
+  </li>
+
+  <li>
     <p>Un fallo en la aplicación de mensajería de las iCosas <a
 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/";>permitió
 a un sitio web malicioso obtener todo el historial de mensajes del
@@ -485,7 +493,7 @@
 <p class="unprintable"><!-- timestamp start -->
 Última actualización:
 
-$Date: 2016/07/17 09:58:34 $
+$Date: 2016/08/04 14:30:06 $
 
 <!-- timestamp end -->
 </p>

Index: po/malware-apple.es-en.html
===================================================================
RCS file: /web/www/www/proprietary/po/malware-apple.es-en.html,v
retrieving revision 1.23
retrieving revision 1.24
diff -u -b -r1.23 -r1.24
--- po/malware-apple.es-en.html 17 Jul 2016 09:58:34 -0000      1.23
+++ po/malware-apple.es-en.html 4 Aug 2016 14:30:06 -0000       1.24
@@ -123,6 +123,13 @@
 
 <ul>
   <li>
+    <p>A vulnerability in Apple's Image I/O API allowed an attacker
+    to <a 
href="https://www.theguardian.com/technology/2016/jul/22/stagefright-flaw-ios-iphone-imessage-apple";>execute
+    malacious code from any application which uses this API to render
+    a certain kind of image file</a>.</p>
+  </li>
+
+  <li>
     <p>A bug in the iThings Messages
       app <a 
href="https://theintercept.com/2016/04/12/apple-bug-exposed-chat-history-with-a-single-click/";>allowed
         a malicious web site to extract all the user's messaging history</a>.
@@ -431,7 +438,7 @@
 
 <p class="unprintable">Updated:
 <!-- timestamp start -->
-$Date: 2016/07/17 09:58:34 $
+$Date: 2016/08/04 14:30:06 $
 <!-- timestamp end -->
 </p>
 </div>



reply via email to

[Prev in Thread] Current Thread [Next in Thread]